Ian Tho – Managing the Risks of IT Outsourcing

197

This page intentionally left blank

References.qxd 3/1/05 3:29 PM Page 199

References

Alexander, M. and Young, D. (1996) Strategic outsourcing. Long Range Planning 29 (1): 116–119.

Aubert, B.A., Patry, M. and Rivard, S. (1998) Assessing the Risk of IT Outsourcing, Proceedings of the Thirty-First Hawaii International Conference on System Sciences (HICSS), IEEE, Hawaii.

Baker, G.L. and Gollub, J.P. (1990) Chaotic Dynamics. Cambridge University Press, London.

Bensaou, M. (1999) Portfolios of Buyer-Supplier Relationships.

Sloan Management Review 40 (4): 35–44.

Blaxill, M.F. and Hout, T.M. (1991) The fallacy of the overhead quick fix. Harvard Business Review 69 (4): 93–101.

Boehm, B.W. (1991) Software Risk Management: Principles and Practices. IEEE Software, January 1991, pp. 32–42.

Brislin, R. (1999) Communicating Information about Culture and Personality in Formal Cross-Cultural Training Programs.

Personality and Person Perception Across Cultures. Lawrence Erlbaum, Mahwah, New Jersey, pp. 255–277.

Caldwell, B. (1997) Why Outsource? – Some Organisations Find Switching Doesn’t Lower Costs. Information Week, 659.

Carr, D.B. and Nicholson, W.L. (1988) A program for exploring four-dimensional data using stereo-ray glyphs, dimensional constraints, rotation, and masking. In W.S. Cleveland and M.E. McGill (eds), Dynamic Graphics for Statistics, Wassworth, Belmont, CA, pp. 309–329.

Clemons, E.K. (1995) Using scenario analysis to manage the strategic risks of reengineering. Sloan Management Review 36 (4): 61–71.

Clemons, E.K. (2000) The Build/Buy Battle – Balancing the risks and rewards of information serve outsourcing. CIO Magazine (1st December, 2000).

Currie, W.L. and Willcocks, L.P. (1997) New Strategies in IT

Outsourcing: Major Trends and Global Practice Report. Business Intelligence Ltd, London (December, 1997).

199

References.qxd 3/1/05 3:29 PM Page 200

Managing the Risks of IT Outsourcing

DiRomualdo, A. and Gurbaxani, V. (1998) Strategic intent for IT

outsourcing. Sloan Management Review 39 (4): 67–80.

Domberger, S. (1998) The Contracting Organisation: A Strategic Guide to Outsourcing. Oxford University Press, Oxford, UK.

Donner, S. (2001) KPMG’s Risk Management Services. KPMG

LLP (June), New York, NY.

Drucker, P.F. (1995) Managing in a Time of Great Change.

Butterworth–Heinemann.

Earl, M.J. (1996) The risks of outsourcing IT. Sloan Management Review 37 (3): 26–32.

Eisenhardt, K. (1989) Agency Theory: An Assessment and Review. Academy of Management Review 14 (1): 57–74.

Elfing, T. and Baven, G. (1994) Outsourcing technical services: stages of development. Long Range Planning 27 (5): 42–51.

Elitzur, R. and Wensley, A. (1997) Game theory as a tool for understanding information services outsourcing. Journal of Information Technology 12: 45–60.

Evans, P. and Wurster, T.S. (2000) Blown to Bits. Harvard Business School Press, Boston, MA.

Fowler, A. (1997) How to outsource personnel. People Management (Feb 20, 1997): 40–42.

Goodridge, E. (2001) Outsourcing makes work for lawyers.

Information Week [online] http://www.techweb.com/wire/

story/TWB20010102S0004; accessed 15th April, 2003.

Hagedoorn, J. (1993) Understanding the rationale of strategic technology partnering: inter-organisational modes of cooper-ation and sectoral differences. Strategic Management Journal 14: 371–385.

Hamel, G. and Prahalad, C.K. (1994) Competing for the Future.

Harvard Business School Press, Boston, MA.

Hofstede, G. (1980) Motivation, leadership, and organizations: do American theories apply abroad? Organizational Dynamics (Summer, 1980).

Holmstrom, B. and Milgrom, P. (1991) Multitask principal-agent analysis: incentive contracts, asset ownership and job design.

Journal of Law, Economics and Organisations 7 (2): 24–52.

Hoskisson, R., Johnson, R.A. and Moesel, D.D. (1994) Corporate divesture intensity in restructuring organisations: effects of governance, strategy, and performance. Academy of Management Journal 37: 1207–1251.

Jones, J.M.G. and Hunter, D. (1995) Consensus methods for medical and health services research. British Medical Journal 311: 376–380.

Kaplan, R.S. and Norton, D.P. (1996) The Balanced Scorecard.

Harvard Business School Press, Boston, MA.

200

References.qxd 3/1/05 3:29 PM Page 201

References

Keller, P.R. and Keller, M.M. (1993) Visual Cues: Practical Data Visualization. IEEE Press, New Jersey, p. 24.

Kern, T. and Willcocks, L. (2001) The Relationship Advantage: Information Technologies, Sourcing and Management. Oxford University Press, Oxford.

Kern, T., Willcocks, L.P. and van Heck, E. (2002) The winner’s curse in IT outsourcing: strategies for avoiding relational trauma. California Management Review 44 (2): 6–24.

Lewis, T. and Sappington, D. (1991) Technological change and the boundaries of the organisation. American Economic Review (September): 887–900.

Lorenz, E.N. (1993) The Essence of Chaos, reprint edition (April 1996). University of Washington Press, USA.

Markides, C.C. and Williamson, P.J. (1994) Related diversification, core competences and corporate performance.

Strategic Management Journal 15 (Special Issue, Summer): 149–165.

Markus, M.L. and Tanis, C. (2000) The organisation systems experience – from adoption to success. In R.W. Smud (ed.), Framing the Domains of IT Research: Glimpsing the Future Through the Past. Pinnaflex, Cincinnati, OH.

McMillan, J. (1992) Games, Strategies and Managers. Oxford University Press, New York, NY, p. 6.

Miller, G.A. (1994) Reprint of the magical number seven, plus or minus two: some limits on our capacity for processing information. Psychological Review 101: 343–349.

Murphy, J. (2004) Management update: evaluating and mitigating Outsourcing risk. Gartner Outsourcing Report [online], http://www3.gartner.com/ps/asset_61461_1535.jsp; accessed 5th May, 2004.

Nash, J.F. (1951) Noncooperative Games. Annals of Mathematics 54: 289–295.

Nash, J.F. (1953) Two-person cooperative games. Econometrica 21: 128–140.

Nelson, P., Richmond, W. and Seidmann, A. (1996) Two dimensions of software acquisition. Communications of the ACM 39

(7): 29–35.

Porter, M.E. (1985) The Competitive Advantage. The Free Press, New York, NY.

Prahalad, C. and Hamel, G. (1990) The core competence of the corporation. Harvard Business Review 68 (3): 79–91.

Quinn, J.B. and Hilmer, F.G. (1994) Strategic outsourcing. Sloan Management Review 35 (4): 43–55.

Quinn, J.B. (1993) The Intelligent Organisation. The Free Press, New York, NY.

201

References.qxd 3/1/05 3:29 PM Page 202

Managing the Risks of IT Outsourcing

Roach, S.S. (1991) Services under siege – the restructuring imperative. Harvard Business Review 69 (5): 82–92.

Saunders, C., Gebelt, M. and Hu, Q. (1997) Achieving success in information systems outsourcing. California Management Review 39 (2): 63–79.

Schirripa, F. and Tecotsky, N. (2000) An optimal frontier. The Journal of Portfolio Management 26 (4): 29–40.

Shachtman, N. (1998) Measure success – careful metrics help businesses get what they need from their outsourcing deals.

Information Week 706 (October 26, 1998).

Sherer, S. (1995) The Three Dimensions of Software Risk: Technical, Organisational, and Environmental. HICSS

Proceedings (January 1995), IEEE Press, New Jersey, pp.

369–378.

Sobol, M. and Apte, U. (1998) Outsourcing practices and views of America’s most effective IS users. In L.P. Willcocks and M.C. Lacity (eds), Strategic Sourcing of Information Systems, Wiley, Chichester.

Teng, J.T.C., Cheon, M.I. and Grover, V. (1995) Decisions to outsource information systems functions: testing a strategy-theoretic discrepancy model. Decision Sciences 26 (1): 75–103.

Tho, L.I. (2004) An investigation of the interaction between risk types in the outsourcing of the information technology function. Deakin University Thesis, Australia.

Venkatesan, R. (1992) Strategic sourcing: to make or not to make.

Harvard Business Review 70 (6): p. 101.

Venkatraman, N. (1997) Beyond outsourcing: managing IT

resources as a value centre. Sloan Management Review 38 (3): 51–64.

202

Index.qxd 3/1/05 12:34 PM Page 203

Index

Actuarial Standards Board, 81

Competence, 21

Additional Resource Charges, 89

Competitive, 21

Adverse selection, 113

Conflict, 35

Agency Theory, 67, 68, 112, 152

Constant alpha. See Risk Exposure

Alpha

Contract irreversibility, 69

constant, 147

Contract mechanism, 35

Ambiguity, 160

penalty clause, 188

Application

Contract periods, 105

development, 180

Contracting, 9

maintenance, 179

prime contractor, 187

ARC. See Additional Resource Charges Co-operative games, 151

Assumptions, 163

Core Competency, 10, 15, 22, 41, 42, 44,

Auction, 110, 111, 112, 121

49, 57, 135

benefits, 46

Baseline, 8, 39

core business, 170

Benefits

distinctive competency, 44

Buyer, 24

diversification, 43

Common, 24

specialization, 43

Supplier, 23

Corporate memory, 91

Bi-directional, 67

Cosourcing, 7

Blurred organizational boundaries, 11

Creation, 142

Business continuity, 176

Cross Platform Services, 176

Business intelligence, 39

Business process management, 48

Dai-Ichi Kangyo, 29

Business-to-business, 111

Data centre, 176

Buyer relationship, 13

Degree of diversification, 45

Buyer RDS, 192

Degrees of economic freedom, 32

Dell, 5

Catalyst, 170

Delphi technique, 134

Causality. See Cause and effect

Desktop, 176

Cause and effect, 68, 78, 142, 143, 153

Determinism, 71

Cellphone. See Mobile telephone

Differentiation, 20

Change management, 36

Diminishing service levels, 69

Chaos theory, 151

Disaster recovery, 176, 179

Chaotic systems, 151

Dissatisfaction. See Outsourcing failures Chief Information Officer, 168

Divergence, 30

203

Index.qxd 3/1/05 12:34 PM Page 204

Index

Early adopters, 19

Intrusive factors, 66

E-commerce, 52

IRR. See Internal Rate of Return

Economies of scale, 14, 21, 22, 23, 24, 25, IT function, 42

29, 43, 46, 47, 48, 54, 120, 122, 135, 165

commoditization, 49

Ecosystem

outsourcing, 50

risk, 151

performance, 42

Employee resistance, 37

productivity paradox, 53

Equilibrium, 12, 82, 146, 147, 148, 149 150, 151, role, 49

152, 154, 155, 156, 165, 167

Escalating costs, 69

Joint development, 14

External influences. See Influence Joint Venture, 32

External Service Provider, 91

Keiretsu, 29

Facilities, 179

horizontal, 30

Fulcrum, 148

vertical, 30

Fuyo, 29

Key Performance Indicators, 6

Fuzzy logic, 161

Kodak, 9

KPI. See Key Performance Indicators Gambling, 65

KPMG, 75

Game theory, 149

Gartner, 19

Laboratory, 169

Governance, 8, 9, 12, 13, 22, 25, 27, 35, 36, 48, LAN. See Local Area Network

51, 53, 56, 68, 75, 81, 103, 112, 114, 116, 117, Lever, 148

125, 126, 132, 134, 147, 166, 179, 180, 194

Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48

Leave a Reply 0

Your email address will not be published. Required fields are marked *